Below is a practical, ISO/SAE 21434-aligned description of how cryptography is used in an automotive ECU across the full lifecycle, clearly distinguishing Tier-1 vs OEM responsibilities. This is written in the way assessors, auditors, and OEM cybersecurity teams expect to see it.
1. Concept Phase (Item Definition & Threat Analysis)
Purpose of Cryptography
At this phase, cryptography is not yet implemented, but strategically defined to mitigate threats identified in TARA.
Typical Cryptographic Objectives
Prevent unauthorized software execution
Ensure authenticity of ECUs and vehicle networks
Protect sensitive data (keys, firmware, personal data)
Enable secure diagnostics and updates
Standards Driving Decisions
OEM internal cryptographic policy (algorithms, key lengths, PKI model)
OEM Responsibility
Define cryptographic strategy:
Symmetric vs asymmetric crypto
Define Cybersecurity Goals & Claims
Define Vehicle PKI (VPKI) concept
Define lifecycle key ownership
Tier-1 Responsibility
Provide feasibility input
Propose crypto-capable HW (MCU, HSM)
Identify performance & cost impacts
2. System & Architecture Design Phase
Cryptography Gets Architected
Key Design Elements
Cryptographic services partitioning
Typical Mechanisms
Asymmetric signatures (RSA/ECC)
MACs, symmetric encryption
Firmware signing + encryption
OEM Responsibility
Approve:
Algorithms (e.g. AES-128/256, ECC-P256)
Define security interfaces (Diag, OTA, CAN, Ethernet)
Define key provisioning model
Tier-1 Responsibility
Design ECU security architecture
Integrate:
Hardware Security Module (HSM)
Define crypto APIs and isolation
3. Detailed Design & Implementation Phase
Cryptography Is Implemented in ECU Software & Hardware
Common Implementations
Secure Boot chain:
Boot ROM β Bootloader β Application
Secure Flashing:
Signed & optionally encrypted firmware
Secure Communication:
CAN/Ethernet message authentication
Secure Diagnostics:
Certificate-based or key-based access
Tier-1 Responsibility (Primary Owner)
Ensure:
Keys never leave secure boundary
OEM Responsibility
Approve key lengths, curves, modes
Review misuse risks (weak randomness, reuse)
4. Integration, Verification & Validation
What Is Verified
Correct cryptographic behavior under attack conditions
Secure boot bypass attempts
Invalid signature injection
Diagnostic brute-force attempts
Tier-1 Responsibility
Pen-testing of ECU interfaces
OEM Responsibility
Vehicle-level cybersecurity validation
Independent penetration testing
5. Production & Manufacturing Phase
Cryptography Becomes Operational
Key Activities
OEM Responsibility
Approve manufacturing security
Tier-1 Responsibility
Secure manufacturing environment
6. Operation & Maintenance Phase (Vehicle in Field)
Cryptography Protects Live Vehicle
Usage Examples
Secure diagnostics at workshops
Secure backend-to-vehicle communication
ECU authentication on vehicle network
OEM Responsibility
Tier-1 Responsibility
Provide root cause analysis for crypto incidents
7. End-of-Life (EOL) Phase
Cryptography Is Decommissioned
Activities
OEM Responsibility
Ensure backend revocation
Compliance with UN R155 CSMS
Tier-1 Responsibility
Support secure decommissioning
Provide EOL documentation
Summary: Tier-1 vs OEM Responsibilities
ECU crypto implementation
Cryptography Checklist for ECU Projects
1. Planning / Concept Phase (Item Definition & TARA)
Governance & Strategy
β Cryptographic policy received from OEM (algorithms, key sizes, curves, modes)
β Regulatory alignment confirmed (ISO/SAE 21434, UN R155)
β Cryptography included in Cybersecurity Goals & Claims
β Cryptography mapped to threat scenarios in TARA
β Clear Tier-1 vs OEM responsibility split defined
High-Level Design Decisions
β Root of Trust (RoT) concept defined
β PKI vs symmetric key strategy decided
β Secure boot required? (Yes/No β justification)
β Secure diagnostics required? (Yes/No)
β Secure OTA/update requirement confirmed
2. System & Architecture Design Phase
Architecture & Trust Boundaries
β Secure boot chain defined (ROM β Bootloader β App)
β Trust boundaries documented (HW, SW, backend)
β Secure storage location for keys identified
β Hardware security capability confirmed (HSM/TPM/TEE)
Algorithms & Mechanisms
β Approved algorithms selected (e.g., AES, ECC, SHA-2)
β Random number generation source defined (TRNG/DRBG)
β Message authentication vs encryption decision justified
β Certificate hierarchy defined (Root, Intermediate, ECU)
β Cryptography applied to:
β In-vehicle communication (CAN/Ethernet)
β Diagnostics (UDS/DoIP)
β Secure failure behavior defined (no silent bypass)
3. Detailed Design Phase
Key Management Design
β Key types identified (root, boot, session, diagnostic)
β Key lifetimes defined
β Key rotation strategy defined
β Revocation mechanism designed
β No shared keys across ECUs (unless justified)
Software Design
β Crypto services isolated from application logic
β Use of standard crypto stack (e.g. AUTOSAR Crypto)
β No custom crypto algorithms
β No hard-coded secrets
β Side-channel considerations documented
4. Implementation Phase
β Certified or OEM-approved crypto library used
β Proper key zeroization implemented
β Secure memory access enforced
β Error handling does not leak sensitive info
β Debug/test backdoors removed or protected
Secure Boot & Flashing
β Firmware authenticity verified before execution
β Rollback protection implemented
β Flashing requires cryptographic authorization
β Integrity check covers full image
5. Integration & Verification Phase
Functional Verification
β Secure boot verification tested (valid/invalid images)
β Secure flashing tested (authorized/unauthorized)
β Diagnostic authentication tested
β Communication authentication/encryption tested
Security Testing
β Replay attack resistance verified
β Brute-force resistance verified
β Fault injection behavior checked
β Pen-test findings addressed
β Cryptography test reports available
β Traceability to cybersecurity requirements complete
6. Production & End-of-Line (EOL β Manufacturing)
Key Injection & Provisioning
β Secure key injection process approved by OEM
β Keys generated in secure environment
β ECU identity (certificate/ID) provisioned
β Manufacturing access protected with crypto
Manufacturing Security
β No master keys exposed to operators
β Logging of key provisioning events enabled
β Separation of test vs production keys enforced
β Secure erase of temporary secrets completed
7. Operation & Maintenance (Vehicle in Field)
Live Cryptographic Operations
β Secure diagnostics enforced in workshops
β OTA updates cryptographically protected
β Backend authentication enforced
β Certificate validity monitored
Incident Handling
β Certificate/key revocation supported
β Crypto updates supported without ECU replacement
β Incident response procedure defined (CSMS)
8. End-of-Life (Vehicle & ECU Decommissioning)
Decommissioning
β Backend access revoked
β Certificates invalidated
β Diagnostic access restricted or disabled
Reuse & Disposal
β ECU reuse prevention strategy defined
β Secure wipe procedure supported (if required)
β EOL compliance evidence available (UN R155)
Final OEM / Tier-1 Ownership Snapshot